2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC) 2021
DOI: 10.1109/ccwc51732.2021.9375988
|View full text |Cite
|
Sign up to set email alerts
|

A Multi-Layered Defense Approach to Safeguard Against Ransomware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 6 publications
0
1
0
Order By: Relevance
“…Hybrid techniques employ multiple detection and protection techniques in a multi-layered approach for detection and prevention of ransomware attacks. Jr and Elleithy [66], proposed a five-layered approach to prevent and safeguard against ransomware attacks, which includes perimeter defense, network defense, endpoint defense, data backup and recovery, and end-user awareness and training. Patyal et al [67], proposed a multi-layered defense architecture against ransomware attacks consisting of six layers: network, host, application, data, backup, and user education.…”
Section: Hybrid Detection Techniquesmentioning
confidence: 99%
“…Hybrid techniques employ multiple detection and protection techniques in a multi-layered approach for detection and prevention of ransomware attacks. Jr and Elleithy [66], proposed a five-layered approach to prevent and safeguard against ransomware attacks, which includes perimeter defense, network defense, endpoint defense, data backup and recovery, and end-user awareness and training. Patyal et al [67], proposed a multi-layered defense architecture against ransomware attacks consisting of six layers: network, host, application, data, backup, and user education.…”
Section: Hybrid Detection Techniquesmentioning
confidence: 99%
“…Early ransomware defense strategies revolved around regular data backups and user education, aiming to mitigate the impact of data loss and avoid ransom payments [12,13,26]. Antivirus software, initially designed to detect known malware signatures, evolved to include heuristic analysis, enabling the detection of previously unknown ransomware variants, and security researchers demonstrated the efficacy of whitelisting applications as a means to prevent ransomware execution on protected systems [11,27]. The use of behavior-based detection tools became prevalent, focusing on identifying abnormal file modification activities indicative of ransomware behavior [12,[28][29][30][31][32].…”
Section: Ransomware Defense Strategiesmentioning
confidence: 99%
“…The impetus behind the development of self-healing networks is rooted in the critical need to overcome the deficiencies of traditional network security frameworks, especially in the face of the continuously evolving and increasingly sophisticated nature of ransomware attacks [10]. Conventional security measures, including firewalls and antivirus software, typically function on a reactive basis and rely heavily on predefined rules and known threat patterns, rendering them less effective against new or advanced ransomware variants that can rapidly adapt and mutate [11]. In contrast, self-healing networks represent a proactive and fluid approach to network security [6,10].…”
Section: Introductionmentioning
confidence: 99%
“…In addition to the previous most adopted ones, a variety of other prevention schemes can be found in the literature. For instance, a multi-layered prevention system is proposed in references [130,131], where, among other possible techniques, anti-malware software deployment, firewall configuration, DNS/Web filtering and email security can be considered. In this way, in case of a ransomware incident, the multi-layer defence will allow us to recover data.…”
mentioning
confidence: 99%